default search action
Xinyi Huang 0001
Person information
- unicode name: 黄欣沂
- affiliation: Fujian Normal University, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou, China
- affiliation (PhD 2009): University of Wollongong, School of Computer Science and Software Engineering, Australia
Other persons with the same name
- Xinyi Huang (aka: Xin-yi Huang, Xin-Yi Huang) — disambiguation page
- Xinyi (Lisa) Huang (aka: Xinyi Huang 0002) — University of Waterloo, Waterloo, ON, Canada
- Xinyi Huang 0003 — Kent State University, OH, USA
- Xinyi Huang 0004 — Nanjing University, Jiangsu Center for Collaborative Innovation in Geographical Information Resource Development and Application, School of Geography and Ocean Science, China
- Xinyi Huang 0005 — Jianghan University, School of Artificial Intelligence, China
- Xinyi Huang 0006 — Guangdong University of Technology, School of Computers, Guangdong Provincial Key Laboratory of Cyber-Physical System, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j222]Shiyang Li, Wenjie Yang, Futai Zhang, Xinyi Huang, Rongmao Chen:
Practical two-party SM2 signing using multiplicative-to-additive functionality. Comput. Stand. Interfaces 92: 103928 (2025) - [e11]Xiaofeng Chen, Xinyi Huang, Moti Yung:
Data Security and Privacy Protection - Second International Conference, DSPP 2024, Xi'an, China, October 25-28, 2024, Proceedings, Part I. Lecture Notes in Computer Science 15215, Springer 2025, ISBN 978-981-97-8539-1 [contents] - [e10]Xiaofeng Chen, Xinyi Huang, Moti Yung:
Data Security and Privacy Protection - Second International Conference, DSPP 2024, Xi'an, China, October 25-28, 2024, Proceedings, Part II. Lecture Notes in Computer Science 15216, Springer 2025, ISBN 978-981-97-8545-2 [contents] - 2024
- [j221]Yongcheng Song, Jiang Zhang, Xinyi Huang, Wei Wu, Haixia Chen:
Analysis and Construction of Zero-Knowledge Proofs for the MinRank Problem. Comput. J. 67(3): 1060-1075 (2024) - [j220]Cheng-Jun Lin, Rui Xue, Xinyi Huang, Shao-Jun Yang:
New tag-based signatures and their applications on linearly homomorphic signatures. Comput. Stand. Interfaces 88: 103804 (2024) - [j219]Yong Zhao, Shao-Jun Yang, Xinyi Huang:
Lattice-based dynamic universal accumulator: Design and application. Comput. Stand. Interfaces 89: 103807 (2024) - [j218]Yuchen Xiao, Lei Zhang, Yafang Yang, Wei Wu, Jianting Ning, Xinyi Huang:
Provably secure multi-signature scheme based on the standard SM2 signature scheme. Comput. Stand. Interfaces 89: 103819 (2024) - [j217]Zesen Hou, Jianting Ning, Xinyi Huang, Shengmin Xu, Leo Yu Zhang:
Blockchain-based efficient verifiable outsourced attribute-based encryption in cloud. Comput. Stand. Interfaces 90: 103854 (2024) - [j216]Zhiqiang Ruan, Xu Yang, Haibo Luo, Xuechao Yang, Yuan Miao, Xinyi Huang, Xun Yi:
A Robust and Secure Data Access Scheme for Satellite-Assisted Internet of Things With Content Adaptive Addressing. IEEE Internet Things J. 11(8): 13393-13410 (2024) - [j215]Hong Zhao, Enting Guo, Zhuotao Lian, Yong Zhao, Xinyi Huang, Chunhua Su:
A review and implementation of physical layer channel key generation in the Internet of Things. J. Inf. Secur. Appl. 83: 103779 (2024) - [j214]Xin Chen, Debiao He, Cong Peng, Min Luo, Xinyi Huang:
A Secure and Effective Hierarchical Identity-Based Signature Scheme for ADS-B Systems. IEEE Trans. Aerosp. Electron. Syst. 60(4): 5157-5168 (2024) - [j213]Guowen Xu, Xingshuo Han, Tianwei Zhang, Shengmin Xu, Jianting Ning, Xinyi Huang, Hongwei Li, Robert H. Deng:
SIMC 2.0: Improved Secure ML Inference Against Malicious Clients. IEEE Trans. Dependable Secur. Comput. 21(4): 1708-1723 (2024) - [j212]Jun Shen, Xiaofeng Chen, Xinyi Huang, Yang Xiang:
Public Proofs of Data Replication and Retrievability With User-Friendly Replication. IEEE Trans. Dependable Secur. Comput. 21(4): 2057-2067 (2024) - [j211]Xiaohan Hao, Chao Lin, Wenhan Dong, Xinyi Huang, Hui Xiong:
Robust and Secure Federated Learning Against Hybrid Attacks: A Generic Architecture. IEEE Trans. Inf. Forensics Secur. 19: 1576-1588 (2024) - [j210]Guowei Ling, Fei Tang, Chaochao Cai, Jinyong Shan, Haiyang Xue, Wulu Li, Peng Tang, Xinyi Huang, Weidong Qiu:
P²FRPSI: Privacy-Preserving Feature Retrieved Private Set Intersection. IEEE Trans. Inf. Forensics Secur. 19: 2201-2216 (2024) - [j209]Jinguang Han, Willy Susilo, Nan Li, Xinyi Huang:
OLBS: Oblivious Location-Based Services. IEEE Trans. Inf. Forensics Secur. 19: 2231-2243 (2024) - [j208]Xiaohu Wang, Chao Lin, Xinyi Huang, Debiao He:
Anonymity-Enhancing Multi-Hop Locks for Monero-Enabled Payment Channel Networks. IEEE Trans. Inf. Forensics Secur. 19: 2438-2453 (2024) - [j207]Lang Pu, Chao Lin, Jingjing Gu, Xinyi Huang, Debiao He:
Generic Construction of Conditional Privacy-Preserving Certificateless Signatures With Efficient Instantiations for VANETs. IEEE Trans. Inf. Forensics Secur. 19: 5449-5463 (2024) - [j206]Xiaotong Zhou, Debiao He, Jianting Ning, Min Luo, Xinyi Huang:
Single-Server Public-Key Authenticated Encryption With Keyword Search and Its Application in IIoT. IEEE Trans. Netw. Sci. Eng. 11(1): 404-415 (2024) - [j205]Shengmin Xu, Jianting Ning, Xiaoguo Li, Jiaming Yuan, Xinyi Huang, Robert H. Deng:
A Privacy-Preserving and Redactable Healthcare Blockchain System. IEEE Trans. Serv. Comput. 17(2): 364-377 (2024) - [j204]Shengmin Xu, Xingshuo Han, Guowen Xu, Jianting Ning, Xinyi Huang, Robert H. Deng:
An Adaptive Secure and Practical Data Sharing System With Verifiable Outsourced Decryption. IEEE Trans. Serv. Comput. 17(3): 776-788 (2024) - [c83]Jialiu Cheng, Yi Wang, Rongmao Chen, Xinyi Huang:
Subverting Cryptographic Protocols from a Fine-Grained Perspective- A Case Study on 2-Party ECDSA. ACISP (2) 2024: 370-390 - [c82]Zihan Liu, Chao Lin, Debiao He, Xinyi Huang, Lang Pu:
Universal and Trustless Large-Value Payments in Cryptocurrencies. ICDCS 2024: 415-426 - [c81]Cong Peng, Rongmao Chen, Yi Wang, Debiao He, Xinyi Huang:
Parameter-Hiding Order-Revealing Encryption Without Pairings. Public Key Cryptography (4) 2024: 227-256 - [i19]Jingyu Liu, Yingjie Xue, Zifan Peng, Chao Lin, Xinyi Huang:
FairRelay: Fair and Cost-Efficient Peer-to-Peer Content Delivery through Payment Channel Networks. CoRR abs/2405.02973 (2024) - [i18]Yijia Chang, Hanrui Jiang, Chao Lin, Xinyi Huang, Jian Weng:
Towards Understanding and Enhancing Security of Proof-of-Training for DNN Model Ownership Verification. CoRR abs/2410.04397 (2024) - [i17]Cong Peng, Rongmao Chen, Yi Wang, Debiao He, Xinyi Huang:
Parameter-Hiding Order-Revealing Encryption without Pairings. IACR Cryptol. ePrint Arch. 2024: 434 (2024) - 2023
- [j203]Yong Zhao, Shao-Jun Yang, Wei Wu, Xinyi Huang:
A Lattice-Based Redactable Signature Scheme using Cryptographic Accumulators for Trees. Comput. J. 66(12): 2961-2973 (2023) - [j202]Yunru Zhang, Debiao He, Pandi Vijayakumar, Min Luo, Xinyi Huang:
SAPFS: An Efficient Symmetric-Key Authentication Key Agreement Scheme With Perfect Forward Secrecy for Industrial Internet of Things. IEEE Internet Things J. 10(11): 9716-9726 (2023) - [j201]Xinyi Huang, Yuchuan Luo, Lin Liu, Wentao Zhao, Shaojing Fu:
Randomization is all you need: A privacy-preserving federated learning framework for news recommendation. Inf. Sci. 637: 118943 (2023) - [j200]Jianghua Liu, Jian Yang, Wei Wu, Xinyi Huang, Yang Xiang:
Lightweight Authentication Scheme for Data Dissemination in Cloud-Assisted Healthcare IoT. IEEE Trans. Computers 72(5): 1384-1395 (2023) - [j199]Guohua Tian, Jianghong Wei, Miroslaw Kutylowski, Willy Susilo, Xinyi Huang, Xiaofeng Chen:
VRBC: A Verifiable Redactable Blockchain With Efficient Query and Integrity Auditing. IEEE Trans. Computers 72(7): 1928-1942 (2023) - [j198]Qi Feng, Debiao He, Min Luo, Xinyi Huang, Kim-Kwang Raymond Choo:
EPRICE: An Efficient and Privacy-Preserving Real-Time Incentive System for Crowdsensing in Industrial Internet of Things. IEEE Trans. Computers 72(9): 2482-2495 (2023) - [j197]Zijian Bao, Debiao He, Wei Wei, Cong Peng, Xinyi Huang:
LedgerMaze: An Efficient Privacy-Preserving Noninteractive Zero-Knowledge Scheme Over Account-Model Blockchain. IEEE Trans. Computers 72(12): 3489-3502 (2023) - [j196]Lin Liu, Jinshu Su, Ximeng Liu, Rongmao Chen, Xinyi Huang, Guang Kou, Shaojing Fu:
Towards Strong Privacy Protection for Association Rule Mining and Query in the Cloud. IEEE Trans. Cloud Comput. 11(3): 3211-3225 (2023) - [j195]Yongcheng Song, Jiang Zhang, Xinyi Huang, Wei Wu, Haining Yang:
Statistical zero-knowledge and analysis of rank-metric zero-knowledge proofs of knowledge. Theor. Comput. Sci. 952: 113731 (2023) - [j194]Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng:
A Secure EMR Sharing System With Tamper Resistance and Expressive Access Control. IEEE Trans. Dependable Secur. Comput. 20(1): 53-67 (2023) - [j193]Chao Lin, Xinyi Huang, Debiao He:
EBCPA: Efficient Blockchain-Based Conditional Privacy-Preserving Authentication for VANETs. IEEE Trans. Dependable Secur. Comput. 20(3): 1818-1832 (2023) - [j192]Pengfei Wu, Jianting Ning, Xinyi Huang, Joseph K. Liu:
Differentially Oblivious Two-Party Pattern Matching With Sublinear Round Complexity. IEEE Trans. Dependable Secur. Comput. 20(5): 4101-4117 (2023) - [j191]Guowen Xu, Xingshuo Han, Shengmin Xu, Tianwei Zhang, Hongwei Li, Xinyi Huang, Robert H. Deng:
Hercules: Boosting the Performance of Privacy-Preserving Federated Learning. IEEE Trans. Dependable Secur. Comput. 20(5): 4418-4433 (2023) - [j190]Chao Lin, Xinyi Huang, Jianting Ning, Debiao He:
ACA: Anonymous, Confidential and Auditable Transaction Systems for Blockchain. IEEE Trans. Dependable Secur. Comput. 20(6): 4536-4550 (2023) - [j189]Xinyi Hu, Debiao He, Min Luo, Cong Peng, Qi Feng, Xinyi Huang:
High-Performance Implementation of the Identity-Based Signature Scheme in IEEE P1363 on GPU. ACM Trans. Embed. Comput. Syst. 22(2): 25:1-25:35 (2023) - [j188]Douwei Lei, Debiao He, Cong Peng, Min Luo, Zhe Liu, Xinyi Huang:
Faster Implementation of Ideal Lattice-Based Cryptography Using AVX512. ACM Trans. Embed. Comput. Syst. 22(5): 83:1-83:18 (2023) - [j187]Shengmin Xu, Xinyi Huang, Jiaming Yuan, Yingjiu Li, Robert H. Deng:
Accountable and Fine-Grained Controllable Rewriting in Blockchains. IEEE Trans. Inf. Forensics Secur. 18: 101-116 (2023) - [j186]Xiaotong Zhou, Debiao He, Jianting Ning, Min Luo, Xinyi Huang:
AADEC: Anonymous and Auditable Distributed Access Control for Edge Computing Services. IEEE Trans. Inf. Forensics Secur. 18: 290-303 (2023) - [j185]Kai Zhang, Xiwen Wang, Jianting Ning, Xinyi Huang:
Dual-Server Boolean Data Retrieval for Highly-Scalable Secure File Sharing Services. IEEE Trans. Inf. Forensics Secur. 18: 449-462 (2023) - [j184]Guowen Xu, Shengmin Xu, Jinhua Ma, Jianting Ning, Xinyi Huang:
An Adaptively Secure and Efficient Data Sharing System for Dynamic User Groups in Cloud. IEEE Trans. Inf. Forensics Secur. 18: 5171-5185 (2023) - [j183]Kai Zhang, Xiwen Wang, Jianting Ning, Junqing Gong, Xinyi Huang:
Secure Cloud-Assisted Data Pub/Sub Service With Fine-Grained Bilateral Access Control. IEEE Trans. Inf. Forensics Secur. 18: 5286-5301 (2023) - [j182]Xiaotong Zhou, Debiao He, Jianting Ning, Min Luo, Xinyi Huang:
Efficient Construction of Verifiable Timed Signatures and Its Application in Scalable Payments. IEEE Trans. Inf. Forensics Secur. 18: 5345-5358 (2023) - [j181]Fei Zhu, Xun Yi, Alsharif Abuadbba, Ibrahim Khalil, Xinyi Huang, Feihong Xu:
A Security-Enhanced Certificateless Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 24(10): 10456-10466 (2023) - [j180]Yuexin Zhang, Fengjuan Zhou, Xinyi Huang, Li Xu, Ayong Ye:
Key Extraction Using Ambient Sounds for Smart Devices. ACM Trans. Sens. Networks 19(1): 16:1-16:20 (2023) - [j179]Jianghong Wei, Xiaofeng Chen, Jianfeng Wang, Xinyi Huang, Willy Susilo:
Securing Fine-Grained Data Sharing and Erasure in Outsourced Storage Systems. IEEE Trans. Parallel Distributed Syst. 34(2): 552-566 (2023) - [j178]Pengfei Wu, Jianting Ning, Wu Luo, Xinyi Huang, Debiao He:
Exploring Dynamic Task Loading in SGX-Based Distributed Computing. IEEE Trans. Serv. Comput. 16(1): 288-301 (2023) - [j177]Jingwei Wang, Xinchun Yin, Jianting Ning, Shengmin Xu, Guowen Xu, Xinyi Huang:
Secure Updatable Storage Access Control System for EHRs in the Cloud. IEEE Trans. Serv. Comput. 16(4): 2939-2953 (2023) - [j176]Chao Lin, Xinyi Huang, Debiao He:
Efficient Blockchain-Based Electronic Medical Record Sharing With Anti-Malicious Propagation. IEEE Trans. Serv. Comput. 16(5): 3294-3304 (2023) - [j175]Jinhua Ma, Shengmin Xu, Jianting Ning, Xinyi Huang, Robert H. Deng:
Catch me if you can: A Secure Bilateral Access Control System With Anonymous Credentials. IEEE Trans. Serv. Comput. 16(6): 4444-4455 (2023) - [j174]Fei Zhu, Xun Yi, Alsharif Abuadbba, Ibrahim Khalil, Surya Nepal, Xinyi Huang:
Authenticated Data Sharing With Privacy Protection and Batch Verification for Healthcare IoT. IEEE Trans. Sustain. Comput. 8(1): 32-42 (2023) - [c80]Yi Wang, Rongmao Chen, Xinyi Huang, Moti Yung:
Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic Constructions. ASIACRYPT (6) 2023: 135-167 - [c79]Yongcheng Song, Jiang Zhang, Xinyi Huang, Wei Wu:
Blockwise Rank Decoding Problem and LRPC Codes: Cryptosystems with Smaller Sizes. ASIACRYPT (7) 2023: 284-316 - [c78]Hong Zhao, Enting Guo, Chunhua Su, Xinyi Huang:
Instant and Secure Channel Key Extraction Scheme Among Wireless Devices. GLOBECOM 2023: 5366-5371 - [c77]Hong Zhao, Enting Guo, Chunhua Su, Xinyi Huang:
Efficient and Appropriate Key Generation Scheme in Different IoT Scenarios. ICICS 2023: 738-749 - [i16]Yongcheng Song, Jiang Zhang, Xinyi Huang, Wei Wu:
Blockwise Rank Decoding Problem and LRPC Codes: Cryptosystems with Smaller Sizes. IACR Cryptol. ePrint Arch. 2023: 1387 (2023) - [i15]Yi Wang, Rongmao Chen, Xinyi Huang, Moti Yung:
Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic Constructions. IACR Cryptol. ePrint Arch. 2023: 1828 (2023) - 2022
- [j173]Fei Zhu, Xun Yi, Alsharif Abuadbba, Ibrahim Khalil, Surya Nepal, Xinyi Huang:
Forward-Secure Edge Authentication for Graphs. Comput. J. 65(7): 1653-1665 (2022) - [j172]Jianchang Lai, Xinyi Huang, Debiao He, Wei Wu:
Provably Secure Online/Offline Identity-Based Signature Scheme Based on SM9. Comput. J. 65(7): 1692-1701 (2022) - [j171]Xu Yang, Xuechao Yang, Xun Yi, Ibrahim Khalil, Xiaotong Zhou, Debiao He, Xinyi Huang, Surya Nepal:
Blockchain-Based Secure and Lightweight Authentication for Internet of Things. IEEE Internet Things J. 9(5): 3321-3332 (2022) - [j170]Hong Zhao, Yuexin Zhang, Xinyi Huang, Yang Xiang, Chunhua Su:
A Physical-Layer Key Generation Approach Based on Received Signal Strength in Smart Homes. IEEE Internet Things J. 9(7): 4917-4927 (2022) - [j169]Fei Zhu, Xun Yi, Alsharif Abuadbba, Ibrahim Khalil, Surya Nepal, Xinyi Huang, Xingfu Yan:
Certificate-Based Anonymous Authentication With Efficient Aggregation for Wireless Medical Sensor Networks. IEEE Internet Things J. 9(14): 12209-12218 (2022) - [j168]Xu Yang, Xun Yi, Ibrahim Khalil, Junwei Luo, Elisa Bertino, Surya Nepal, Xinyi Huang:
Secure and Lightweight Authentication for Mobile-Edge Computing-Enabled WBANs. IEEE Internet Things J. 9(14): 12563-12572 (2022) - [j167]Jianchang Lai, Fuchun Guo, Willy Susilo, Peng Jiang, Guomin Yang, Xinyi Huang:
Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts. Inf. Sci. 613: 966-981 (2022) - [j166]Manli Yuan, Yi Mu, Fatemeh Rezaeibagha, Li Xu, Xinyi Huang:
Controllable software licensing system for sub-licensing. J. Inf. Secur. Appl. 64: 103061 (2022) - [j165]Shaojun Yang, Xinyi Huang:
Convex invariants of M-fuzzifying convex spaces. J. Intell. Fuzzy Syst. 43(1): 1077-1090 (2022) - [j164]Chao Lin, Min Luo, Xinyi Huang, Kim-Kwang Raymond Choo, Debiao He:
An Efficient Privacy-Preserving Credit Score System Based on Noninteractive Zero-Knowledge Proof. IEEE Syst. J. 16(1): 1592-1601 (2022) - [j163]Jiguo Li, Yichen Zhang, Jianting Ning, Xinyi Huang, Geong Sen Poh, Debang Wang:
Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT. IEEE Trans. Cloud Comput. 10(2): 762-773 (2022) - [j162]Shaojun Yang, Xinyi Huang:
Universal product learning with errors: A new variant of LWE for lattice-based cryptography. Theor. Comput. Sci. 915: 90-100 (2022) - [j161]Jinhua Ma, Xinyi Huang, Yi Mu, Robert H. Deng:
Authenticated Data Redaction With Accountability and Transparency. IEEE Trans. Dependable Secur. Comput. 19(1): 149-160 (2022) - [j160]Jianting Ning, Xinyi Huang, Willy Susilo, Kaitai Liang, Ximeng Liu, Yinghui Zhang:
Dual Access Control for Cloud-Based Data Storage and Sharing. IEEE Trans. Dependable Secur. Comput. 19(2): 1036-1048 (2022) - [j159]Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng:
Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing. IEEE Trans. Dependable Secur. Comput. 19(2): 1064-1077 (2022) - [j158]Jianting Ning, Geong Sen Poh, Xinyi Huang, Robert H. Deng, Shuwei Cao, Ee-Chien Chang:
Update Recovery Attacks on Encrypted Database Within Two Updates Using Range Queries Leakage. IEEE Trans. Dependable Secur. Comput. 19(2): 1164-1180 (2022) - [j157]Jinrong Chen, Lin Liu, Rongmao Chen, Wei Peng, Xinyi Huang:
SecRec: A Privacy-Preserving Method for the Context-Aware Recommendation System. IEEE Trans. Dependable Secur. Comput. 19(5): 3168-3182 (2022) - [j156]Pengfei Wu, Qi Li, Jianting Ning, Xinyi Huang, Wei Wu:
Differentially Oblivious Data Analysis With Intel SGX: Design, Optimization, and Evaluation. IEEE Trans. Dependable Secur. Comput. 19(6): 3741-3758 (2022) - [j155]Shengmin Xu, Jianting Ning, Xinyi Huang, Yingjiu Li, Guowen Xu:
Untouchable Once Revoking: A Practical and Secure Dynamic EHR Sharing System via Cloud. IEEE Trans. Dependable Secur. Comput. 19(6): 3759-3773 (2022) - [j154]Yi Wang, Rongmao Chen, Xinyi Huang, Baosheng Wang:
Secure Anonymous Communication on Corrupted Machines With Reverse Firewalls. IEEE Trans. Dependable Secur. Comput. 19(6): 3837-3854 (2022) - [j153]Guohua Tian, Yunhan Hu, Jianghong Wei, Zheli Liu, Xinyi Huang, Xiaofeng Chen, Willy Susilo:
Blockchain-Based Secure Deduplication and Shared Auditing in Decentralized Storage. IEEE Trans. Dependable Secur. Comput. 19(6): 3941-3954 (2022) - [j152]Jinhua Ma, Shengmin Xu, Jianting Ning, Xinyi Huang, Robert H. Deng:
Redactable Blockchain in Decentralized Setting. IEEE Trans. Inf. Forensics Secur. 17: 1227-1242 (2022) - [j151]Haixia Chen, Xinyi Huang, Jianting Ning, Futai Zhang, Chao Lin:
VILS: A Verifiable Image Licensing System. IEEE Trans. Inf. Forensics Secur. 17: 1420-1434 (2022) - [j150]Kai Zhang, Zhe Jiang, Jianting Ning, Xinyi Huang:
Subversion-Resistant and Consistent Attribute-Based Keyword Search for Secure Cloud Storage. IEEE Trans. Inf. Forensics Secur. 17: 1771-1784 (2022) - [j149]Jianchang Lai, Fuchun Guo, Willy Susilo, Xinyi Huang, Peng Jiang, Futai Zhang:
Data Access Control in Cloud Computing: Flexible and Receiver Extendable. IEEE Trans. Serv. Comput. 15(5): 2658-2670 (2022) - [j148]Xu Yang, Xun Yi, Surya Nepal, Ibrahim Khalil, Xinyi Huang, Jian Shen:
Efficient and Anonymous Authentication for Healthcare Service With Cloud Based WBANs. IEEE Trans. Serv. Comput. 15(5): 2728-2741 (2022) - [c76]Liang Zhao, Ze Chen, Liqun Chen, Xinyi Huang:
An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile. ACNS 2022: 45-64 - [c75]Jiaojiao Wu, Jianfeng Wang, Xinwei Yong, Xinyi Huang, Xiaofeng Chen:
New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal Overhead. ESORICS (1) 2022: 346-366 - [c74]Fei Zhu, Xun Yi, Alsharif Abuadbba, Junwei Luo, Surya Nepal, Xinyi Huang:
Efficient Hash-Based Redactable Signature for Smart Grid Applications. ESORICS (3) 2022: 554-573 - [c73]Ding Wang, Yunkai Zou, Qiying Dong, Yuanming Song, Xinyi Huang:
How to Attack and Generate Honeywords. SP 2022: 966-983 - [e9]Xiaofeng Chen, Xinyi Huang, Miroslaw Kutylowski:
Security and Privacy in Social Networks and Big Data - 8th International Symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022, Proceedings. Communications in Computer and Information Science 1663, Springer 2022, ISBN 978-981-19-7241-6 [contents] - [i14]Guowen Xu, Xingshuo Han, Shengmin Xu, Tianwei Zhang, Hongwei Li, Xinyi Huang, Robert H. Deng:
Hercules: Boosting the Performance of Privacy-preserving Federated Learning. CoRR abs/2207.04620 (2022) - [i13]Guowen Xu, Shengmin Xu, Jianting Ning, Tianwei Zhang, Xinyi Huang, Hongwei Li, Rongxing Lu:
New Secure Sparse Inner Product with Applications to Machine Learning. CoRR abs/2210.08421 (2022) - [i12]Hao Ren, Guowen Xu, Tianwei Zhang, Jianting Ning, Xinyi Huang, Hongwei Li, Rongxing Lu:
Efficiency Boosting of Secure Cross-platform Recommender Systems over Sparse Data. CoRR abs/2212.01537 (2022) - [i11]Jiaojiao Wu, Jianfeng Wang, Xinwei Yong, Xinyi Huang, Xiaofeng Chen:
New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal Overhead. IACR Cryptol. ePrint Arch. 2022: 1028 (2022) - 2021
- [j147]Haixia Chen, Xinyi Huang, Wei Wu, Yi Mu:
Privacy-Aware Image Authentication from Cryptographic Primitives. Comput. J. 64(8): 1178-1192 (2021) - [j146]Chao Lin, Debiao He, Hongjie Zhang, Lisong Shao, Xinyi Huang:
Privacy-Enhancing Decentralized Anonymous Credential in Smart Grids. Comput. Stand. Interfaces 75: 103505 (2021) - [j145]Meixia Miao, Yunling Wang, Jianfeng Wang, Xinyi Huang:
Verifiable database supporting keyword searches with forward security. Comput. Stand. Interfaces 77: 103491 (2021) - [j144]Fei Zhu, Xun Yi, Alsharif Abuadbba, Ibrahim Khalil, Surya Nepal, Xinyi Huang:
Cost-Effective Authenticated Data Redaction With Privacy Protection in IoT. IEEE Internet Things J. 8(14): 11678-11689 (2021) - [j143]Fatemeh Rezaeibagha, Yi Mu, Ke Huang, Leyou Zhang, Xinyi Huang:
Secure and Privacy-Preserved Data Collection for IoT Wireless Sensors. IEEE Internet Things J. 8(24): 17669-17677 (2021) - [j142]Liang Zhao, Xingfeng Wang, Xinyi Huang:
Verifiable single-server private information retrieval from LWE with binary errors. Inf. Sci. 546: 897-923 (2021) - [j141]Chao Lin, Debiao He, Xinyi Huang, Xiang Xie, Kim-Kwang Raymond Choo:
PPChain: A Privacy-Preserving Permissioned Blockchain Architecture for Cryptocurrency and Other Regulated Applications. IEEE Syst. J. 15(3): 4367-4378 (2021) - [j140]Jianghua Liu, Jingyu Hou, Wenjie Yang, Yang Xiang, Wanlei Zhou, Wei Wu, Xinyi Huang:
Leakage-Free Dissemination of Authenticated Tree-Structured Data With Multi-Party Control. IEEE Trans. Computers 70(7): 1120-1131 (2021) - [j139]Jianghua Liu, Jinhua Ma, Yang Xiang, Wanlei Zhou, Xinyi Huang:
Authenticated Medical Documents Releasing with Privacy Protection and Release Control. IEEE Trans. Dependable Secur. Comput. 18(1): 448-459 (2021) - [j138]Haijiang Wang, Jianting Ning, Xinyi Huang, Guiyi Wei, Geong Sen Poh, Ximeng Liu:
Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud. IEEE Trans. Dependable Secur. Comput. 18(3): 1307-1319 (2021) - [j137]Jianghong Wei, Xiaofeng Chen, Xinyi Huang, Xuexian Hu, Willy Susilo:
RS-HABE: Revocable-Storage and Hierarchical Attribute-Based Access Scheme for Secure Sharing of e-Health Records in Public Cloud. IEEE Trans. Dependable Secur. Comput. 18(5): 2301-2315 (2021) - [j136]Yusheng Xia, Jinshu Su, Rongmao Chen, Xinyi Huang:
APGS: An Efficient Source-Accountable and Metadata-Private Protocol in the Network Layer. IEEE Trans. Inf. Forensics Secur. 16: 1245-1260 (2021) - [j135]Chao Lin, Debiao He, Xinyi Huang, Kim-Kwang Raymond Choo:
OBFP: Optimized Blockchain-Based Fair Payment for Outsourcing Computations in Cloud Computing. IEEE Trans. Inf. Forensics Secur. 16: 3241-3253 (2021) - [j134]Shengmin Xu, Jianting Ning, Jinhua Ma, Xinyi Huang, Robert H. Deng:
K-Time Modifiable and Epoch-Based Redactable Blockchain. IEEE Trans. Inf. Forensics Secur. 16: 4507-4520 (2021) - [j133]Shengmin Xu, Jianting Ning, Xinyi Huang, Jianying Zhou, Robert H. Deng:
Server-Aided Bilateral Access Control for Secure Data Sharing With Dynamic User Groups. IEEE Trans. Inf. Forensics Secur. 16: 4746-4761 (2021) - [j132]Chao Lin, Debiao He, Xinyi Huang, Neeraj Kumar, Kim-Kwang Raymond Choo:
BCPPA: A Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 22(12): 7408-7420 (2021) - [j131]Xiaofeng Chen, Hui Li, Jin Li, Qian Wang, Xinyi Huang, Willy Susilo, Yang Xiang:
Publicly Verifiable Databases With All Efficient Updating Operations. IEEE Trans. Knowl. Data Eng. 33(12): 3729-3740 (2021) - [j130]Chao Lin, Debiao He, Sherali Zeadally, Xinyi Huang, Zhe Liu:
Blockchain-based Data Sharing System for Sensing-as-a-Service in Smart Cities. ACM Trans. Internet Techn. 21(2): 40:1-40:21 (2021) - [j129]Peng Jiang, Fuchun Guo, Willy Susilo, Man Ho Au, Xinyi Huang, Joseph K. Liu:
Efficient and Adaptive Procurement Protocol with Purchasing Privacy. IEEE Trans. Serv. Comput. 14(3): 683-694 (2021) - [c72]Yi Wang, Rongmao Chen, Xinyi Huang, Jianting Ning, Baosheng Wang, Moti Yung:
Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-Secure IBE. ASIACRYPT (2) 2021: 427-455 - [c71]Jianting Ning, Xinyi Huang, Geong Sen Poh, Jiaming Yuan, Yingjiu Li, Jian Weng, Robert H. Deng:
LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset. CCS 2021: 2307-2320 - [c70]Yi Wang, Rongmao Chen, Guomin Yang, Xinyi Huang, Baosheng Wang, Moti Yung:
Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved. CRYPTO (4) 2021: 270-300 - [c69]Shao-Jun Yang, Xinyi Huang:
Category of CFR(Y)C and Weak Topos. FSDM 2021: 226-235 - [c68]Shao-Jun Yang, Xinyi Huang, Mingmei Zheng, Jinhua Ma:
Ring Trapdoor Redactable Signatures from Lattice. ISPEC 2021: 190-208 - [c67]Cheng-Jun Lin, Rui Xue, Xinyi Huang:
Linearly Homomorphic Signatures with Designated Combiner. ProvSec 2021: 327-345 - [c66]Shengmin Xu, Jianting Ning, Jinhua Ma, Xinyi Huang, HweeHwa Pang, Robert H. Deng:
Expressive Bilateral Access Control for Internet-of-Things in Cloud-Fog Computing. SACMAT 2021: 143-154 - [c65]Xu Yang, Xun Yi, Surya Nepal, Ibrahim Khalil, Xinyi Huang, Jian Shen:
Efficient and Anonymous Authentication for Healthcare Service With Cloud Based WBANs. SERVICES 2021: 11 - [i10]Yi Wang, Rongmao Chen, Guomin Yang, Xinyi Huang, Baosheng Wang, Moti Yung:
Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved. IACR Cryptol. ePrint Arch. 2021: 862 (2021) - [i9]Yi Wang, Rongmao Chen, Xinyi Huang, Jianting Ning, Baosheng Wang, Moti Yung:
Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-secure IBE. IACR Cryptol. ePrint Arch. 2021: 1261 (2021) - [i8]Liang Zhao, Ze Chen, Liqun Chen, Xinyi Huang:
An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile. IACR Cryptol. ePrint Arch. 2021: 1534 (2021) - 2020
- [j128]Yongcheng Song, Xinyi Huang, Yi Mu, Wei Wu:
An improved Durandal signature scheme. Sci. China Inf. Sci. 63(3) (2020) - [j127]Sheng Zhong, Xinyi Huang:
Special focus on security and privacy in blockchain-based applications. Sci. China Inf. Sci. 63(3) (2020) - [j126]Haixia Chen, Xinyi Huang, Wei Wu, Yi Mu:
Efficient and secure image authentication with robustness and versatility. Sci. China Inf. Sci. 63(12) (2020) - [j125]Wenjie Yang, Jian Weng, Xinyi Huang, Anjia Yang:
A Provably Secure Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks. Comput. J. 63(8): 1139-1147 (2020) - [j124]Cheng-Jun Lin, Rui Xue, Shao-Jun Yang, Xinyi Huang, Shimin Li:
Linearly Homomorphic Signatures from Lattices. Comput. J. 63(12): 1871-1885 (2020) - [j123]Jianghua Liu, Jingyu Hou, Xinyi Huang, Yang Xiang, Tianqing Zhu:
Secure and efficient sharing of authenticated energy usage data with privacy preservation. Comput. Secur. 92: 101756 (2020) - [j122]Xinyi Huang, Yuexin Zhang:
Indistinguishability and unextractablility of password-based authentication in blockchain. Future Gener. Comput. Syst. 112: 561-566 (2020) - [j121]Yudi Zhang, Debiao He, Xinyi Huang, Ding Wang, Kim-Kwang Raymond Choo, Jing Wang:
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography. IEICE Trans. Inf. Syst. 103-D(2): 188-195 (2020) - [j120]Qi Feng, Debiao He, Huaqun Wang, Ding Wang, Xinyi Huang:
Multi-party key generation protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography. IET Inf. Secur. 14(6): 724-732 (2020) - [j119]Chao Lin, Debiao He, Neeraj Kumar, Xinyi Huang, Pandi Vijayakumar, Kim-Kwang Raymond Choo:
HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes. IEEE Internet Things J. 7(2): 818-829 (2020) - [j118]Yuexin Zhang, Xinyi Huang, Xiaofeng Chen, Leo Yu Zhang, Jun Zhang, Yang Xiang:
A Hybrid Key Agreement Scheme for Smart Homes Using the Merkle Puzzle. IEEE Internet Things J. 7(2): 1061-1071 (2020) - [j117]Jie Li, Rongmao Chen, Jinshu Su, Xinyi Huang, Xiaofeng Wang:
ME-TLS: Middlebox-Enhanced TLS for Internet-of-Things Devices. IEEE Internet Things J. 7(2): 1216-1229 (2020) - [j116]Chao Lin, Debiao He, Xinyi Huang, Xiang Xie, Kim-Kwang Raymond Choo:
Blockchain-based system for secure outsourcing of bilinear pairings. Inf. Sci. 527: 590-601 (2020) - [j115]Yongcheng Song, Xinyi Huang, Yi Mu, Wei Wu, Huaxiong Wang:
A code-based signature scheme from the Lyubashevsky framework. Theor. Comput. Sci. 835: 15-30 (2020) - [j114]Jinhua Ma, Jianghua Liu, Xinyi Huang, Yang Xiang, Wei Wu:
Authenticated Data Redaction with Fine-Grained Control. IEEE Trans. Emerg. Top. Comput. 8(2): 291-302 (2020) - [j113]Chao Lin, Debiao He, Xinyi Huang, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain. IEEE Trans. Inf. Forensics Secur. 15: 2440-2452 (2020) - [j112]Lingjun Zhao, Chunhua Su, Zeyang Dai, Huakun Huang, Shuxue Ding, Xinyi Huang, Zhaoyang Han:
Indoor device-free passive localization with DCNN for location-based services. J. Supercomput. 76(11): 8432-8449 (2020) - [j111]Jian Shen, Dengzhi Liu, Debiao He, Xinyi Huang, Yang Xiang:
Algebraic Signatures-Based Data Integrity Auditing for Efficient Data Dynamics in Cloud Computing. IEEE Trans. Sustain. Comput. 5(2): 161-173 (2020) - [c64]Rongmao Chen, Xinyi Huang, Moti Yung:
Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption. ASIACRYPT (2) 2020: 98-128 - [c63]Yudi Zhang, Debiao He, Fangguo Zhang, Xinyi Huang, Dawei Li:
An Efficient Blind Signature Scheme Based on SM2 Signature Algorithm. Inscrypt 2020: 368-384 - [c62]Jianting Ning, Xinyi Huang, Geong Sen Poh, Shengmin Xu, Jia-Ch'ng Loh, Jian Weng, Robert H. Deng:
Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment. ESORICS (1) 2020: 3-22 - [c61]Fei Zhu, Xun Yi, Sharif Abuadbba, Ibrahim Khalil, Xu Yang, Surya Nepal, Xinyi Huang:
Privacy-Preserving Authentication for Tree-Structured Data with Designated Verification in Outsourced Environments. ProvSec 2020: 145-165 - [i7]Rongmao Chen, Xinyi Huang, Moti Yung:
Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption. IACR Cryptol. ePrint Arch. 2020: 1079 (2020)
2010 – 2019
- 2019
- [j110]Kai He, Yijun Mao, Jianting Ning, Kaitai Liang, Xinyi Huang, Emmanouil Panaousis, George Loukas:
A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality. IEEE Access 7: 50658-50668 (2019) - [j109]Wenjie Yang, Shangpeng Wang, Xinyi Huang, Yi Mu:
On the Security of an Efficient and Robust Certificateless Signature Scheme for IIoT Environments. IEEE Access 7: 91074-91079 (2019) - [j108]Fatemeh Rezaeibagha, Yi Mu, Xinyi Huang, Wenjie Yang, Ke Huang:
Fully Secure Lightweight Certificateless Signature Scheme for IIoT. IEEE Access 7: 144433-144443 (2019) - [j107]Xu Yang, Xun Yi, Ibrahim Khalil, Hui Cui, Xuechao Yang, Surya Nepal, Xinyi Huang, Yali Zeng:
A new privacy-preserving authentication protocol for anonymous web browsing. Concurr. Comput. Pract. Exp. 31(21) (2019) - [j106]Cristina Alcaraz, Mike Burmester, Jorge Cuéllar, Xinyi Huang, Panayiotis Kotzanikolaou, Mihalis Psarakis:
Guest Editorial Special Issue on Secure Embedded IoT Devices for Resilient Critical Infrastructures. IEEE Internet Things J. 6(5): 7988-7991 (2019) - [j105]Yuexin Zhang, Hong Zhao, Yang Xiang, Xinyi Huang, Xiaofeng Chen:
A Key Agreement Scheme for Smart Homes Using the Secret Mismatch Problem. IEEE Internet Things J. 6(6): 10251-10260 (2019) - [j104]Jinguang Han, Liqun Chen, Willy Susilo, Xinyi Huang, Aniello Castiglione, Kaitai Liang:
Fine-grained information flow control using attributes. Inf. Sci. 484: 167-182 (2019) - [j103]Huige Wang, Yuan Zhang, Kefei Chen, Guangye Sui, Yunlei Zhao, Xinyi Huang:
Functional broadcast encryption with applications to data sharing for cloud storage. Inf. Sci. 502: 109-124 (2019) - [j102]Xu Yang, Xun Yi, Ibrahim Khalil, Yali Zeng, Xinyi Huang, Surya Nepal, Xuechao Yang, Hui Cui:
A lightweight authentication scheme for vehicular ad hoc networks based on MSR. Veh. Commun. 15: 16-27 (2019) - [c60]Dan Wang, Shao-Jun Yang, Xinyi Huang:
The Degree of Arity ≤ n About M-Fuzzifying Convex Space. FSDM 2019: 337-343 - [c59]Hong Zhao, Yuexin Zhang, Xinyi Huang, Yang Xiang:
An Adaptive Secret Key Establishment Scheme in Smart Home Environments. ICC 2019: 1-6 - [c58]Hong Zhao, Yuexin Zhang, Xinyi Huang, Yang Xiang:
An Adaptive Physical Layer Key Extraction Scheme for Smart Homes. TrustCom/BigDataSE 2019: 499-506 - [c57]Xin Chen, Xinyi Huang, Yi Mu, Ding Wang:
A Typo-Tolerant Password Authentication Scheme with Targeted Error Correction. TrustCom/BigDataSE 2019: 546-553 - [p2]Jianghua Liu, Yang Xiang, Wanlei Zhou, Xinyi Huang, Jinhua Ma:
Data Authentication with Privacy Protection. Advances in Cyber Security 2019: 115-142 - [p1]Yuexin Zhang, Xinyi Huang:
Security and Privacy Techniques for the Industrial Internet of Things. Security and Privacy Trends in the Industrial Internet of Thing 2019: 245-268 - [e8]Yi Mu, Robert H. Deng, Xinyi Huang:
Cryptology and Network Security - 18th International Conference, CANS 2019, Fuzhou, China, October 25-27, 2019, Proceedings. Lecture Notes in Computer Science 11829, Springer 2019, ISBN 978-3-030-31577-1 [contents] - [e7]Fuchun Guo, Xinyi Huang, Moti Yung:
Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11449, Springer 2019, ISBN 978-3-030-14233-9 [contents] - [e6]Xiaofeng Chen, Xinyi Huang, Jun Zhang:
Machine Learning for Cyber Security - Second International Conference, ML4CS 2019, Xi'an, China, September 19-21, 2019, Proceedings. Lecture Notes in Computer Science 11806, Springer 2019, ISBN 978-3-030-30618-2 [contents] - [e5]Joseph K. Liu, Xinyi Huang:
Network and System Security - 13th International Conference, NSS 2019, Sapporo, Japan, December 15-18, 2019, Proceedings. Lecture Notes in Computer Science 11928, Springer 2019, ISBN 978-3-030-36937-8 [contents] - 2018
- [j101]Chao Lin, Debiao He, Xinyi Huang, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-Based Identity Management Systems. IEEE Access 6: 28203-28212 (2018) - [j100]Biao Wang, Xueqing Wang, Rui Xue, Xinyi Huang:
Matrix FHE and Its Application in Optimizing Bootstrapping. Comput. J. 61(12): 1845-1861 (2018) - [j99]Chao Lin, Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo, Alexey V. Vinel, Xinyi Huang:
Security and Privacy for the Internet of Drones: Challenges and Solutions. IEEE Commun. Mag. 56(1): 64-69 (2018) - [j98]Cristina Alcaraz, Xinyi Huang, Erich Rome:
Security and privacy in cloud-assisted cyber-physical systems. Comput. Networks 138: 13-14 (2018) - [j97]Hui Huang, Xiaofeng Chen, Qianhong Wu, Xinyi Huang, Jian Shen:
Bitcoin-based fair payments for outsourcing computations of fog devices. Future Gener. Comput. Syst. 78: 850-858 (2018) - [j96]Shao-Jun Yang, Xinyi Huang:
Certain types of M-fuzzifying matroids: A fundamental look at the security protocols in RFID and IoT. Future Gener. Comput. Syst. 86: 582-590 (2018) - [j95]Yuexin Zhang, Yang Xiang, Xinyi Huang, Xiaofeng Chen, Abdulhameed Alelaiwi:
A matrix-based cross-layer key establishment protocol for smart homes. Inf. Sci. 429: 390-405 (2018) - [j94]Jian Shen, Chen Wang, Tong Li, Xiaofeng Chen, Xinyi Huang, Zhi-Hui Zhan:
Secure data uploading scheme for a smart home system. Inf. Sci. 453: 186-197 (2018) - [j93]Chao Lin, Debiao He, Xinyi Huang, Kim-Kwang Raymond Choo, Athanasios V. Vasilakos:
BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. J. Netw. Comput. Appl. 116: 42-52 (2018) - [j92]Yujue Wang, Qianhong Wu, Bo Qin, Xiaofeng Chen, Xinyi Huang, Jungang Lou:
Ownership-hidden group-oriented proofs of storage from pre-homomorphic signatures. Peer-to-Peer Netw. Appl. 11(2): 235-251 (2018) - [j91]Meixia Miao, Jianfeng Ma, Xinyi Huang, Qian Wang:
Efficient Verifiable Databases With Insertion/Deletion Operations From Delegating Polynomial Functions. IEEE Trans. Inf. Forensics Secur. 13(2): 511-520 (2018) - [j90]Qian Wang, Minxin Du, Xiuying Chen, Yanjiao Chen, Pan Zhou, Xiaofeng Chen, Xinyi Huang:
Privacy-Preserving Collaborative Model Learning: The Case of Word Vector Training. IEEE Trans. Knowl. Data Eng. 30(12): 2381-2393 (2018) - [c56]Jian Shen, Dengzhi Liu, Xiaofeng Chen, Xinyi Huang, Jiageng Chen, Mingwu Zhang:
Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing. ACISP 2018: 417-430 - [c55]Jianghua Liu, Jinhua Ma, Wanlei Zhou, Yang Xiang, Xinyi Huang:
Dissemination of Authenticated Tree-Structured Data with Privacy Protection and Fine-Grained Control in Outsourced Databases. ESORICS (2) 2018: 167-186 - [c54]Mingmei Zheng, Shao-Jun Yang, Wei Wu, Jun Shao, Xinyi Huang:
A New Design of Online/Offline Signatures Based on Lattice. ISPEC 2018: 198-212 - [c53]Ding Wang, Haibo Cheng, Ping Wang, Jeff Yan, Xinyi Huang:
A Security Analysis of Honeywords. NDSS 2018 - [c52]Xu Yang, Xun Yi, Yali Zeng, Ibrahim Khalil, Xinyi Huang, Surya Nepal:
An Improved Lightweight RFID Authentication Protocol for Internet of Things. WISE (1) 2018: 111-126 - [i6]Yudi Zhang, Debiao He, Xinyi Huang, Ding Wang, Kim-Kwang Raymond Choo:
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography. IACR Cryptol. ePrint Arch. 2018: 814 (2018) - 2017
- [j89]Xinyi Huang, Joseph K. Liu, Javier López:
Editorial: Special issue on security data science and cyber threat management. Comput. Secur. 69: 1-2 (2017) - [j88]Zechao Liu, Zoe Lin Jiang, Xuan Wang, Xinyi Huang, Siu-Ming Yiu, Kunihiko Sadakane:
Offline/online attribute-based encryption with verifiable outsourced decryption. Concurr. Comput. Pract. Exp. 29(7) (2017) - [j87]Vanga Odelu, Ashok Kumar Das, Saru Kumari, Xinyi Huang, Mohammad Wazid:
Provably secure authenticated key agreement scheme for distributed mobile cloud computing services. Future Gener. Comput. Syst. 68: 74-88 (2017) - [j86]Jianghong Wei, Xinyi Huang, Wenfen Liu, Xuexian Hu:
Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security. Int. J. Found. Comput. Sci. 28(7): 843-868 (2017) - [j85]Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri, Xinyi Huang, Aniello Castiglione:
Supporting dynamic updates in storage clouds with the Akl-Taylor scheme. Inf. Sci. 387: 56-74 (2017) - [j84]Chao Lin, Wei Wu, Xinyi Huang, Li Xu:
A new universal designated verifier transitive signature scheme for big graph data. J. Comput. Syst. Sci. 83(1): 73-83 (2017) - [j83]Man Ho Au, Tsz Hon Yuen, Joseph K. Liu, Willy Susilo, Xinyi Huang, Yang Xiang, Zoe Lin Jiang:
A general framework for secure sharing of personal health records in cloud system. J. Comput. Syst. Sci. 90: 46-62 (2017) - [j82]Joseph K. Liu, Kim-Kwang Raymond Choo, Xinyi Huang, Man Ho Au:
Special issue on security and privacy for smart cities. Pers. Ubiquitous Comput. 21(5): 775 (2017) - [j81]Joseph K. Liu, Kim-Kwang Raymond Choo, Xinyi Huang, Man Ho Au:
Erratum to: Special issue on security and privacy for smart cities. Pers. Ubiquitous Comput. 21(5): 777 (2017) - [j80]Jiguo Li, Fengjie Sha, Yichen Zhang, Xinyi Huang, Jian Shen:
Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length. Secur. Commun. Networks 2017: 3596205:1-3596205:11 (2017) - [j79]Jin Li, Hongyang Yan, Zheli Liu, Xiaofeng Chen, Xinyi Huang, Duncan S. Wong:
Location-Sharing Systems With Enhanced Privacy in Mobile Online Social Networks. IEEE Syst. J. 11(2): 439-448 (2017) - [j78]He Fang, Li Xu, Xinyi Huang:
Self-adaptive trust management based on game theory in fuzzy large-scale networks. Soft Comput. 21(4): 907-921 (2017) - [j77]Jia-Nan Liu, Junzuo Lai, Xinyi Huang:
Dual trapdoor identity-based encryption with keyword search. Soft Comput. 21(10): 2599-2607 (2017) - [j76]Ming Tang, Zhenlong Qiu, Zhipeng Guo, Yi Mu, Xinyi Huang, Jean-Luc Danger:
A Generic Table Recomputation-Based Higher-Order Masking. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 36(11): 1779-1789 (2017) - [j75]Chunhua Su, Bagus Santoso, Yingjiu Li, Robert H. Deng, Xinyi Huang:
Universally Composable RFID Mutual Authentication. IEEE Trans. Dependable Secur. Comput. 14(1): 83-94 (2017) - [j74]Zhe Liu, Xinyi Huang, Zhi Hu, Muhammad Khurram Khan, Hwajeong Seo, Lu Zhou:
On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age. IEEE Trans. Dependable Secur. Comput. 14(3): 237-248 (2017) - [j73]Jianghua Liu, Jinhua Ma, Wei Wu, Xiaofeng Chen, Xinyi Huang, Li Xu:
Protecting Mobile Health Records in Cloud Computing: A Secure, Efficient, and Anonymous Design. ACM Trans. Embed. Comput. Syst. 16(2): 57:1-57:20 (2017) - [j72]Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, Geyong Min:
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage. IEEE Trans. Inf. Forensics Secur. 12(4): 767-778 (2017) - [j71]Jian Shen, Jun Shen, Xiaofeng Chen, Xinyi Huang, Willy Susilo:
An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data. IEEE Trans. Inf. Forensics Secur. 12(10): 2402-2415 (2017) - [j70]Ding Wang, Haibo Cheng, Ping Wang, Xinyi Huang, Gaopeng Jian:
Zipf's Law in Passwords. IEEE Trans. Inf. Forensics Secur. 12(11): 2776-2791 (2017) - [j69]Steven Gordon, Xinyi Huang, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin, Komwut Wipusitwarakun:
Recursive Matrix Oblivious RAM: An ORAM Construction for Constrained Storage Devices. IEEE Trans. Inf. Forensics Secur. 12(12): 3024-3038 (2017) - [j68]Li Xu, Jing Zhang, Yang Xiang, Xinyi Huang:
Network Coding Based Converge-Cast Scheme in Wireless Sensor Networks. Wirel. Pers. Commun. 96(4): 4947-4972 (2017) - [c51]Yanjiang Yang, Joseph K. Liu, Zhuo Wei, Xinyi Huang:
Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing Trust upon Cloud. ACISP (1) 2017: 127-144 - [c50]Yuexin Zhang, Yang Xiang, Xinyi Huang:
A Cross-Layer Key Establishment Model for Wireless Devices in Cyber-Physical Systems. CPSS@AsiaCCS 2017: 43-53 - [c49]Ding Wang, Qianchen Gu, Xinyi Huang, Ping Wang:
Understanding Human-Chosen PINs: Characteristics, Distribution and Security. AsiaCCS 2017: 372-385 - [c48]Zhiqiang Xu, Debiao He, Xinyi Huang:
Secure and Efficient Two-Factor Authentication Protocol Using RSA Signature for Multi-server Environments. ICICS 2017: 595-605 - [c47]Cheng-Jun Lin, Xinyi Huang, Shitang Li, Wei Wu, Shao-Jun Yang:
Linearly Homomorphic Signatures with Designated Entities. ISPEC 2017: 375-390 - [c46]Xu Yang, Xun Yi, Hui Cui, Xuechao Yang, Surya Nepal, Xinyi Huang, YaLi Zeng:
A Practical Authentication Protocol for Anonymous Web Browsing. ISPEC 2017: 468-482 - 2016
- [j67]Jiguo Li, Na Qian, Yichen Zhang, Xinyi Huang:
An Efficient Certificate-Based Designated Verifier Signature Scheme. Comput. Informatics 35(5): 1210-1230 (2016) - [j66]Jianghong Wei, Xinyi Huang, Wenfen Liu, Xuexian Hu:
Practical Attribute-based Signature: Traceability and Revocability. Comput. J. 59(11): 1714-1734 (2016) - [j65]Xu Yang, Xinyi Huang, Jinguang Han, Chunhua Su:
Improved handover authentication and key pre-distribution for wireless mesh networks. Concurr. Comput. Pract. Exp. 28(10): 2978-2990 (2016) - [j64]Xu Yang, Xinyi Huang, Joseph K. Liu:
Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing. Future Gener. Comput. Syst. 62: 190-195 (2016) - [j63]Jinguang Han, Ye Yang, Xinyi Huang, Tsz Hon Yuen, Jiguo Li, Jie Cao:
Accountable mobile E-commerce scheme via identity-based plaintext-checkable encryption. Inf. Sci. 345: 143-155 (2016) - [j62]Qihong Yu, Jiguo Li, Yichen Zhang, Wei Wu, Xinyi Huang, Yang Xiang:
Certificate-based encryption resilient to key leakage. J. Syst. Softw. 116: 101-112 (2016) - [j61]Mingwu Zhang, Yi Mu, Jian Shen, Xinyi Huang:
Strongly average-case secure obfuscation: achieving input privacy and circuit obscurity. Secur. Commun. Networks 9(12): 1737-1747 (2016) - [j60]Ashok Kumar Das, Saru Kumari, Vanga Odelu, Xiong Li, Fan Wu, Xinyi Huang:
Provably secure user authentication and key agreement scheme for wireless sensor networks. Secur. Commun. Networks 9(16): 3670-3687 (2016) - [j59]Shaohua Tang, Xiaoyu Li, Xinyi Huang, Yang Xiang, Lingling Xu:
Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing. IEEE Trans. Computers 65(7): 2325-2331 (2016) - [j58]Joseph K. Liu, Man Ho Au, Xinyi Huang, Rongxing Lu, Jin Li:
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services. IEEE Trans. Inf. Forensics Secur. 11(3): 484-497 (2016) - [j57]Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri, Aniello Castiglione, Jin Li, Xinyi Huang:
Hierarchical and Shared Access Control. IEEE Trans. Inf. Forensics Secur. 11(4): 850-865 (2016) - [j56]Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri, Aniello Castiglione, Xinyi Huang:
Cryptographic Hierarchical Access Control for Dynamic Structures. IEEE Trans. Inf. Forensics Secur. 11(10): 2349-2364 (2016) - [j55]Kaitai Liang, Xinyi Huang, Fuchun Guo, Joseph K. Liu:
Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data. IEEE Trans. Inf. Forensics Secur. 11(10): 2365-2376 (2016) - [j54]Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xinyi Huang, Xiaofen Wang, Yongjun Wang:
Server-Aided Public Key Encryption With Keyword Search. IEEE Trans. Inf. Forensics Secur. 11(12): 2833-2842 (2016) - [j53]Yuexin Zhang, Yang Xiang, Xinyi Huang:
Password-Authenticated Group Key Exchange: A Cross-Layer Design. ACM Trans. Internet Techn. 16(4): 24:1-24:20 (2016) - [c45]Yang Sun, Qianhong Wu, Jingwen Liu, Jianwei Liu, Xinyi Huang, Bo Qin, Wei Hu:
Accelerating Oblivious Transfer with Batch Multi-exponentiation. ACISP (1) 2016: 310-326 - [c44]Ding Wang, Zijian Zhang, Ping Wang, Jeff Yan, Xinyi Huang:
Targeted Online Password Guessing: An Underestimated Threat. CCS 2016: 1242-1254 - [c43]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Shifeng Sun, Xinyi Huang:
Anonymizing Bitcoin Transaction. ISPEC 2016: 271-283 - [c42]Xu Yang, Ting-Ting Lee, Joseph K. Liu, Xinyi Huang:
Trust Enhancement over Range Search for Encrypted Data. Trustcom/BigDataSE/ISPA 2016: 66-73 - [c41]Xiuwen Zhou, Qianhong Wu, Bo Qin, Xinyi Huang, Jianwei Liu:
Distributed Bitcoin Account Management. Trustcom/BigDataSE/ISPA 2016: 105-112 - [e4]Xiaofeng Chen, XiaoFeng Wang, Xinyi Huang:
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016. ACM 2016, ISBN 978-1-4503-4233-9 [contents] - [e3]Xinyi Huang, Yang Xiang, Kuan-Ching Li:
Green, Pervasive, and Cloud Computing - 11th International Conference, GPC 2016, Xi'an, China, May 6-8, 2016. Proceedings. Lecture Notes in Computer Science 9663, Springer 2016, ISBN 978-3-319-39076-5 [contents] - 2015
- [j52]Hui Lin, Li Xu, Xinyi Huang, Wei Wu, Yijie Huang:
A trustworthy access control model for mobile cloud computing based on reputation and mechanism design. Ad Hoc Networks 35: 51-64 (2015) - [j51]Jiguo Li, Huiyun Teng, Xinyi Huang, Yichen Zhang, Jianying Zhou:
A Forward-Secure Certificate-Based Signature Scheme. Comput. J. 58(4): 853-866 (2015) - [j50]Jianghua Liu, Xinyi Huang, Joseph K. Liu:
Secure sharing of Personal Health Records in cloud computing: Ciphertext-Policy Attribute-Based Signcryption. Future Gener. Comput. Syst. 52: 67-76 (2015) - [j49]Yuexin Zhang, Li Xu, Xinyi Huang, Jie Li:
Matrix-based key pre-distribution schemes in WMNs using pre and post deployment knowledge. Int. J. Ad Hoc Ubiquitous Comput. 20(4): 262-273 (2015) - [j48]Mengting Li, Xinyi Huang, Joseph K. Liu, Li Xu, Wei Wu:
Cooperative attribute-based access control for enterprise computing system. Int. J. Embed. Syst. 7(3/4): 191-202 (2015) - [j47]Chuan Yao, Li Xu, Xinyi Huang:
Batch public auditing for distributed mobile cloud computing. Int. J. High Perform. Comput. Netw. 8(2): 102-109 (2015) - [j46]Elisa Bertino, Robert H. Deng, Xinyi Huang, Jianying Zhou:
Security and privacy of electronic health information systems. Int. J. Inf. Sec. 14(6): 485-486 (2015) - [j45]Jin Li, Xiaofeng Chen, Xinyi Huang:
New attribute-based authentication and its application in anonymous cloud access service. Int. J. Web Grid Serv. 11(1): 125-141 (2015) - [j44]Shuquan Hou, Xinyi Huang, Joseph K. Liu, Jin Li, Li Xu:
Universal designated verifier transitive signatures for graph-based big data. Inf. Sci. 318: 144-156 (2015) - [j43]Xinyi Huang, Joseph K. Liu, Shaohua Tang, Yang Xiang, Kaitai Liang, Li Xu, Jianying Zhou:
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security. IEEE Trans. Computers 64(4): 971-983 (2015) - [j42]Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Xinyi Huang, Willy Susilo, Jianying Zhou:
k-Times Attribute-Based Anonymous Access Control for Cloud Computing. IEEE Trans. Computers 64(9): 2595-2608 (2015) - [j41]Jianfeng Wang, Xiaofeng Chen, Xinyi Huang, Ilsun You, Yang Xiang:
Verifiable Auditing for Outsourced Database in Cloud Computing. IEEE Trans. Computers 64(11): 3293-3303 (2015) - [j40]Jin Li, Xiaofeng Chen, Xinyi Huang, Shaohua Tang, Yang Xiang, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi:
Secure Distributed Deduplication Systems with Improved Reliability. IEEE Trans. Computers 64(12): 3569-3579 (2015) - [j39]Joonsang Baek, Quang Hieu Vu, Joseph K. Liu, Xinyi Huang, Yang Xiang:
A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid. IEEE Trans. Cloud Comput. 3(2): 233-244 (2015) - [j38]Xiaofeng Chen, Jin Li, Xinyi Huang, Jianfeng Ma, Wenjing Lou:
New Publicly Verifiable Databases with Efficient Updates. IEEE Trans. Dependable Secur. Comput. 12(5): 546-556 (2015) - [j37]Li Xu, Xinyu Chen, Jie Li, Xinyi Huang, Jianying Zhou:
Cross-layer design in wireless multi-hop networks: a bargaining game theoretic analysis. Telecommun. Syst. 60(1): 149-158 (2015) - [j36]Xiaofeng Chen, Xinyi Huang, Jin Li, Jianfeng Ma, Wenjing Lou, Duncan S. Wong:
New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations. IEEE Trans. Inf. Forensics Secur. 10(1): 69-78 (2015) - [j35]Joseph K. Liu, Cheng-Kang Chu, Sherman S. M. Chow, Xinyi Huang, Man Ho Au, Jianying Zhou:
Time-Bound Anonymous Authentication for Roaming Networks. IEEE Trans. Inf. Forensics Secur. 10(1): 178-189 (2015) - [j34]Debiao He, Sherali Zeadally, Baowen Xu, Xinyi Huang:
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks. IEEE Trans. Inf. Forensics Secur. 10(12): 2681-2691 (2015) - [c40]Yujue Wang, Qianhong Wu, Bo Qin, Xiaofeng Chen, Xinyi Huang, Yunya Zhou:
Group-oriented Proofs of Storage. AsiaCCS 2015: 73-84 - [c39]Zhe Liu, Hwajeong Seo, Zhi Hu, Xinyi Huang, Johann Großschädl:
Efficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks. AsiaCCS 2015: 145-153 - [c38]Jianghong Wei, Xinyi Huang, Xuexian Hu, Wenfen Liu:
Revocable Threshold Attribute-Based Signature against Signing Key Exposure. ISPEC 2015: 316-330 - [i5]Qihong Yu, Jiguo Li, Yichen Zhang, Wei Wu, Xinyi Huang, Yang Xiang:
Certificate-Based Encryption Resilient to Key Leakage. IACR Cryptol. ePrint Arch. 2015: 314 (2015) - 2014
- [j33]Li Xu, Yuan He, Xiaofeng Chen, Xinyi Huang:
Ticket-based handoff authentication for wireless mesh networks. Comput. Networks 73: 185-194 (2014) - [j32]Fatos Xhafa, Xiaofeng Chen, Xinyi Huang, Vladi Kolici:
Advances in secure and intelligent data processing. Concurr. Comput. Pract. Exp. 26(5): 1021-1022 (2014) - [j31]Yanling Lian, Xinyi Huang, Yi Mu:
SA3: Self-adaptive anonymous authentication for dynamic authentication policies. Future Gener. Comput. Syst. 30: 133-139 (2014) - [j30]Chuan Yao, Li Xu, Xinyi Huang, Joseph K. Liu:
A secure remote data integrity checking cloud storage system from threshold encryption. J. Ambient Intell. Humaniz. Comput. 5(6): 857-865 (2014) - [j29]Peter Mueller, Der-Chyuan Lou, Xinyi Huang:
Special issue on applied cryptography for information and communication networks. Secur. Commun. Networks 7(2): 397-398 (2014) - [j28]Xinyi Huang, Xiaofeng Chen, Jin Li, Yang Xiang, Li Xu:
Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems. IEEE Trans. Parallel Distributed Syst. 25(7): 1767-1775 (2014) - [j27]Jin Li, Xinyi Huang, Jingwei Li, Xiaofeng Chen, Yang Xiang:
Securely Outsourcing Attribute-Based Encryption with Checkability. IEEE Trans. Parallel Distributed Syst. 25(8): 2201-2210 (2014) - [j26]Shaohua Tang, Lingling Xu, Niu Liu, Xinyi Huang, Jintai Ding, Zhiming Yang:
Provably Secure Group Key Management Approach Based upon Hyper-Sphere. IEEE Trans. Parallel Distributed Syst. 25(12): 3253-3263 (2014) - [j25]Xiaofeng Chen, Jin Li, Xinyi Huang, Jingwei Li, Yang Xiang, Duncan S. Wong:
Secure Outsourced Attribute-Based Signatures. IEEE Trans. Parallel Distributed Syst. 25(12): 3285-3294 (2014) - [c37]Joseph K. Liu, Man Ho Au, Xinyi Huang, Willy Susilo, Jianying Zhou, Yong Yu:
New Insight to Preserve Online Survey Accuracy and Privacy in Big Data Era. ESORICS (2) 2014: 182-199 - [c36]Yuexin Zhang, Yang Xiang, Xinyi Huang, Li Xu:
A Cross-Layer Key Establishment Scheme in Wireless Mesh Networks. ESORICS (1) 2014: 526-541 - [c35]Shuquan Hou, Xinyi Huang, Li Xu:
Identity-Based Transitive Signcryption. NSS 2014: 246-259 - [c34]Mengting Li, Xinyi Huang, Joseph K. Liu, Li Xu:
GO-ABE: Group-Oriented Attribute-Based Encryption. NSS 2014: 260-270 - [e2]Xinyi Huang, Jianying Zhou:
Information Security Practice and Experience - 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings. Lecture Notes in Computer Science 8434, Springer 2014, ISBN 978-3-319-06319-5 [contents] - 2013
- [j24]Lanxiang Chen, Shuming Zhou, Xinyi Huang, Li Xu:
Data dynamics for remote data possession checking in cloud storage. Comput. Electr. Eng. 39(7): 2413-2424 (2013) - [j23]Ai-Jun Ge, Xinyi Huang, Cheng Chen, Chuangui Ma, Rui Zhang:
Forgeability of Wang-Zhu-Feng-Yau's Attribute-Based Signature with Policy-and-Endorsement Mechanism. J. Comput. Sci. Technol. 28(4): 743-748 (2013) - [j22]Yuexin Zhang, Li Xu, Yang Xiang, Xinyi Huang:
A Matrix-Based Pairwise Key Establishment Scheme for Wireless Mesh Networks Using Pre Deployment Knowledge. IEEE Trans. Emerg. Top. Comput. 1(2): 331-340 (2013) - [c33]Yuexin Zhang, Li Xu, Yang Xiang, Xinyi Huang:
Matrix-based pairwise key establishment in wireless mesh networks using deployment knowledge. ICC 2013: 1604-1608 - [c32]Yuexin Zhang, Li Xu, Xinyi Huang, Jie Li:
Matrix-Based Pairwise Key Establishment with Pre and Post Deployment Knowledge for Wireless Mesh Networks. IMIS 2013: 153-158 - [c31]Chuan Yao, Li Xu, Xinyi Huang:
A Secure Cloud Storage System from Threshold Encryption. INCoS 2013: 541-545 - [c30]Yanling Lian, Li Xu, Xinyi Huang:
Attribute-Based Signatures with Efficient Revocation. INCoS 2013: 573-577 - [e1]Javier López, Xinyi Huang, Ravi S. Sandhu:
Network and System Security - 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings. Lecture Notes in Computer Science 7873, Springer 2013, ISBN 978-3-642-38630-5 [contents] - [i4]Yu-Chi Chen, Raylin Tso, Willy Susilo, Xinyi Huang, Gwoboa Horng:
Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes. IACR Cryptol. ePrint Arch. 2013: 193 (2013) - 2012
- [j21]Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Wei Wu:
Certificateless Signatures: New Schemes and Security Models. Comput. J. 55(4): 457-474 (2012) - [j20]Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang, Li Xu:
A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption. Comput. J. 55(10): 1157-1168 (2012) - [j19]Jiguo Li, Xinyi Huang, Meixue Hong, Yichen Zhang:
Certificate-based signcryption with enhanced security features. Comput. Math. Appl. 64(6): 1587-1601 (2012) - [j18]Jiguo Li, Xinyi Huang, Yichen Zhang, Lizhong Xu:
An efficient short certificate-based signature scheme. J. Syst. Softw. 85(2): 314-322 (2012) - [j17]Xu An Wang, Xinyi Huang, Xiaoyuan Yang, Longfei Liu, Xuguang Wu:
Further observation on proxy re-encryption with keyword search. J. Syst. Softw. 85(3): 643-654 (2012) - [j16]Raylin Tso, Xinyi Huang, Willy Susilo:
Strongly secure certificateless short signatures. J. Syst. Softw. 85(6): 1409-1417 (2012) - [j15]Xinyi Huang, Cheng-Kang Chu, Hung-Min Sun, Jianying Zhou, Robert H. Deng:
Enhanced authentication for commercial video services. Secur. Commun. Networks 5(11): 1248-1259 (2012) - [c29]Sherman S. M. Chow, Cheng-Kang Chu, Xinyi Huang, Jianying Zhou, Robert H. Deng:
Dynamic Secure Cloud Storage with Provenance. Cryptography and Security 2012: 442-464 - [c28]Cheng-Kang Chu, Joseph K. Liu, Xinyi Huang, Jianying Zhou:
Verifier-local revocation group signatures with time-bound keys. AsiaCCS 2012: 26-27 - [c27]Tsz Hon Yuen, Joseph K. Liu, Xinyi Huang, Man Ho Au, Willy Susilo, Jianying Zhou:
Forward Secure Attribute-Based Signatures. ICICS 2012: 167-177 - [c26]Yunmei Zhang, Joseph K. Liu, Xinyi Huang, Man Ho Au, Willy Susilo:
Efficient Escrow-Free Identity-Based Signature. ProvSec 2012: 161-174 - 2011
- [j14]Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang:
Provably secure server-aided verification signatures. Comput. Math. Appl. 61(7): 1705-1723 (2011) - [j13]Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Yang Xiang:
Optimistic Fair Exchange with Strong Resolution-Ambiguity. IEEE J. Sel. Areas Commun. 29(7): 1491-1502 (2011) - [j12]Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Jianying Zhou, Robert H. Deng:
Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures. IEEE Trans. Inf. Forensics Secur. 6(2): 498-512 (2011) - [j11]Xinyi Huang, Yang Xiang, Ashley Chonka, Jianying Zhou, Robert H. Deng:
A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems. IEEE Trans. Parallel Distributed Syst. 22(8): 1390-1397 (2011) - 2010
- [j10]Futai Zhang, Sujuan Li, Songqin Miao, Yi Mu, Willy Susilo, Xinyi Huang:
Cryptanalysis on Two Certificateless Signature Schemes. Int. J. Comput. Commun. Control 5(4): 586-591 (2010) - [j9]Li Xu, Sisheng Chen, Xinyi Huang, Yi Mu:
Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks. Int. J. Secur. Networks 5(1): 35-44 (2010) - [j8]Hong Yuan, Futai Zhang, Xinyi Huang, Yi Mu, Willy Susilo, Lei Zhang:
Certificateless threshold signature scheme from bilinear maps. Inf. Sci. 180(23): 4714-4728 (2010) - [j7]Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, Qianhong Wu:
Constructions of certificate-based signature secure against key replacement attacks. J. Comput. Secur. 18(3): 421-449 (2010) - [c25]Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Yang Xiang:
Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting. Public Key Cryptography 2010: 124-141
2000 – 2009
- 2009
- [j6]Yong Yu, Chunxiang Xu, Xinyi Huang, Yi Mu:
An efficient anonymous proxy signature scheme with provable security. Comput. Stand. Interfaces 31(2): 348-353 (2009) - [j5]Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang:
Certificate-based Signatures Revisited. J. Univers. Comput. Sci. 15(8): 1659-1684 (2009) - 2008
- [j4]Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu:
Secure universal designated verifier signature without random oracles. Int. J. Inf. Sec. 7(3): 171-183 (2008) - [j3]Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang:
Short Designated Verifier Signature Scheme and Its Identity-based Variant. Int. J. Netw. Secur. 6(1): 82-93 (2008) - [j2]Jiguo Li, Xinyi Huang, Yi Mu, Wei Wu:
Cryptanalysis and improvement of an efficient certificateless signature scheme. J. Commun. Networks 10(1): 10-17 (2008) - [c24]Raylin Tso, Xun Yi, Xinyi Huang:
Efficient and Short Certificateless Signature. CANS 2008: 64-79 - [c23]Xu An Wang, Xinyi Huang, Xiaoyuan Yang:
Further Observations on Certificateless Public Key Encryption. Inscrypt 2008: 217-239 - [c22]Dongdong Sun, Xinyi Huang, Yi Mu, Willy Susilo:
Identity-Based On-Line/Off-Line Signcryption. NPC Workshops 2008: 34-41 - [c21]Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang:
Server-Aided Verification Signatures: Definitions and New Constructions. ProvSec 2008: 141-155 - [c20]Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang:
Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures. WISA 2008: 99-114 - 2007
- [j1]Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang:
Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004. J. Comput. Sci. Technol. 22(1): 71-74 (2007) - [c19]Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Wei Wu:
Certificateless Signature Revisited. ACISP 2007: 308-322 - [c18]Yong Yu, Bo Yang, Xinyi Huang, Mingwu Zhang:
Efficient Identity-Based Signcryption Scheme for Multiple Receivers. ATC 2007: 13-21 - [c17]Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xinyi Huang:
Identity-Based Proxy Signature from Pairings. ATC 2007: 22-31 - [c16]Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu:
A Generic Construction for Universally-Convertible Undeniable Signatures. CANS 2007: 15-33 - [c15]Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang:
Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility. Inscrypt 2007: 25-39 - [c14]Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, Qianhong Wu:
Certificate-Based Signature: Security Model and Efficient Construction. EuroPKI 2007: 110-125 - [c13]Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo:
Formal Definition and Construction of Nominative Signature. ICICS 2007: 57-68 - [c12]Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu:
Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length. Pairing 2007: 367-391 - [c11]Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang:
Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction. WISA 2007: 16-29 - [i3]Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo:
Nominative Signature: Application, Security Model and Construction. IACR Cryptol. ePrint Arch. 2007: 69 (2007) - 2006
- [c10]Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang:
Certificateless Designated Verifier Signature Schemes. AINA (2) 2006: 15-19 - [c9]Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu:
Universal Designated Verifier Signature Without Delegatability. ICICS 2006: 479-498 - [c8]Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang:
Short (Identity-Based) Strong Designated Verifier Signature Schemes. ISPEC 2006: 214-225 - [c7]Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu:
Proxy Signature Without Random Oracles. MSN 2006: 473-484 - [c6]Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang:
Restricted Universal Designated Verifier Signature. UIC 2006: 874-882 - [i2]Shidi Xu, Yi Mu, Willy Susilo, Xiaofeng Chen, Xinyi Huang, Fangguo Zhang:
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security. IACR Cryptol. ePrint Arch. 2006: 236 (2006) - 2005
- [c5]Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang:
Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World. AINA 2005: 649-654 - [c4]Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang:
On the Security of Certificateless Signature Schemes from Asiacrypt 2003. CANS 2005: 13-25 - [c3]Xinyi Huang, Yi Mu, Willy Susilo, Fangguo Zhang, Xiaofeng Chen:
A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World. EUC Workshops 2005: 480-489 - [c2]Xinyi Huang, Yi Mu, Willy Susilo, Futai Zhang:
Short Designated Verifier Proxy Signature from Pairings. EUC Workshops 2005: 835-844 - [c1]Yi Mu, Willy Susilo, Xinyi Huang:
Efficient Broadcast from Trapdoor Functions. IWAP 2005: 240-248 - [i1]Xinyi Huang, Willy Susilo, Yi Mu:
Breaking and Repairing Trapdoor-free Group Signature Schemes from Asiacrypt 2004. IACR Cryptol. ePrint Arch. 2005: 122 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 20:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint